This is an open access article published by the IET under the Creative Commons Attribution -NonCommercial License (http://creativecommons.org/licenses/by-nc/3.0/)
Advanced metering infrastructure (AMI), one of the prime components of the smart grid, has many benefits like demand response and load management. Electricity theft, a key concern in AMI security since smart meters used in AMI are vulnerable to cyber attacks, causes millions of dollar in financial losses to utilities every year. In light of this problem, the authors propose an entropy-based electricity theft detection scheme to detect electricity theft by tracking the dynamics of consumption variations of the consumers. Relative entropy is used to compute the distance between probability distributions obtained from consumption variations. When electricity theft attacks are launched against AMI, the probability distribution of consumption variations deviates from historical consumption, thus leading to a larger relative entropy. The proposed method is tested on different attack scenarios using real smart-meter data. The results show that the proposed method detects electricity theft attacks with high detection probability.
References
-
-
1)
-
9. Katakey, R.: ‘India fights to keep the lights on’, June 2014. .
-
2)
-
8. McDaniel, P., McLaughlin, S.: ‘Security and privacy challenges in the smart grid’, IEEE Secur. Privacy, 2009, 7, (3), pp. 75–77.
-
3)
-
4. Lu, R., Liang, X., Li, X., et al: ‘Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications’, IEEE Trans. Parallel Distrib. Syst., 2012, 23, (9), pp. 1621–1631.
-
4)
-
14. Khoo, B., Cheng, Y.: ‘Using RFID for anti-theft in a Chinese electrical supply company: a cost-benefit analysis’. Wireless Telecommunications Symp. (WTS), April 2011, pp. 1–6.
-
5)
-
28. Fawcett, T.: ‘Roc graphs: notes and practical considerations for researchers’. , 2004.
-
6)
-
23. Mashima, D., Cárdenas, A.A.: ‘Evaluating electricity theft detectors in smart grid networks’ (Springer Berlin Heidelberg, Berlin, 2012), pp. 210–229.
-
7)
-
22. Jiang, R., Lu, R., Wang, Y., et al: ‘Energy theft detection issues for advanced metering infrastructure in smart grid’, Tsinghua Sci. Technol., 2014, 19, (2), pp. 105–120.
-
8)
-
11. Lo, C.-H., Ansari, N.: ‘Consumer: a novel hybrid intrusion detection system for distribution networks in smart grid’, IEEE Trans. Emerg. Top. Comput., 2013, 1, (1), pp. 33–44.
-
9)
-
26. Chaojun, G., Jirutitijaroen, P., Motani, M.: ‘Detecting false data injection attacks in ac state estimation’, IEEE Trans. Smart Grid, 2015, 6, (5), pp. 2476–2483.
-
10)
-
29. Zweig, M.H., Campbell, G.: ‘Receiver-operating characteristic (roc) plots: a fundamental evaluation tool in clinical medicine’, Clin. Chem., 1993, 39, (4), pp. 561–577.
-
11)
-
18. Salinas, S., Li, M., Li, P.: ‘Privacy-preserving energy theft detection in smart grids: a p2p computing approach’, IEEE J. Sel. Areas Commun., 2013, 31, (9), pp. 257–267.
-
12)
-
1. Jiang, R., Lu, R., Lai, C., et al: ‘Robust group key management with revocation and collusion resistance for scada in smart grid’. Proc. IEEE Global Communications Conf. (GLOBECOM), December 2013, pp. 802–807.
-
13)
-
20. Depuru, S.S.S.R., Wang, L., Devabhaktuni, V.: ‘Support vector machine based data classification for detection of electricity theft’. Power Systems Conf. and Exposition (PSCE), 2011, March 2011, pp. 1–8.
-
14)
-
15)
-
12. McLaughlin, S., Holbert, B., Fawaz, A., et al: ‘A multi-sensor energy theft detection framework for advanced metering infrastructures’, IEEE J. Sel. Areas Commun., 2013, 31, (7), pp. 1319–1330.
-
16)
-
17)
-
18)
-
24. Cover, T.M., Thomas, J.A.: ‘Elements of information theory’ (Wiley-Interscience, 2006).
-
19)
-
20)
-
13. Xiao, Z., Xiao, Y., Du, D.H.c.: ‘Non-repudiation in neighborhood area networks for smart grid’, IEEE Commun. Mag., 2013, 51, (1), pp. 18–26.
-
21)
-
17. Angelos, E.W.S., Saavedra, O.R., Corts, O.A.C., et al: ‘Detection and identification of abnormalities in customer consumptions in power distribution systems’, IEEE Trans. Power Deliv., 2011, 26, (4), pp. 2436–2442.
-
22)
-
21. Jokar, P., Arianpoo, N., Leung, V.C.M.: ‘Electricity theft detection in AMI using customers consumption patterns’, IEEE Trans. Smart Grid, 2016, 7, (1), pp. 216–226.
-
23)
-
16. Crdenas, A.A., Amin, S., Schwartz, G., et al: ‘A game theory model for electricity theft detection and privacy-aware control in AMI systems’. 50th Annual Allerton Conf. on Communication, Control, and Computing (Allerton), 2012, October 2012, pp. 1830–1837.
-
24)
-
15. Amin, S., Schwartz, G.A., Tembine, H.: ‘Incentives and security in electricity distribution networks’. Int. Conf. on Decision and Game Theory for Security, GameSec, 2012, pp. 264–280.
-
25)
-
26)
-
7. Ward, M.: ‘Smart meters can be hacked to cut power bills’, October 2014. .
-
27)
-
27. Krishna, V.B., Weaver, G.A., Sanders, W.H., et al: ‘Pca-based method for detecting integrity attacks on advanced metering infrastructure’. Proc. of the 12th Int. Conf. on Quantitative Evaluation of Systems, New York, NY, USA, 2015, pp. 70–85.
-
28)
-
19. Depuru, S.S.S.R., Wang, L., Devabhaktuni, V., et al: ‘A hybrid neural network model and encoding technique for enhanced classification of energy consumption data’. IEEE Power and Energy Society General Meeting, July 2011, pp. 1–8.
-
29)
-
6. Wright, J.: ‘Smart meters have security holes’, 2010.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2017.0063
Related content
content/journals/10.1049/iet-cps.2017.0063
pub_keyword,iet_inspecKeyword,pub_concept
6
6